Journal of Information Systems Security最新文献

筛选
英文 中文
Selecting an IT Control Framework 选择IT控制框架
Journal of Information Systems Security Pub Date : 2007-05-01 DOI: 10.1080/10658980701225440
Steven Schlarman
{"title":"Selecting an IT Control Framework","authors":"Steven Schlarman","doi":"10.1080/10658980701225440","DOIUrl":"https://doi.org/10.1080/10658980701225440","url":null,"abstract":"This article originally published in EDPACS 35(2), February 2007, pp 11–17.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74045400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing Information Lifecycle Security (ILS) 实现信息生命周期安全(ILS)
Journal of Information Systems Security Pub Date : 2007-05-01 DOI: 10.1080/10658980601144907
Bill Reed
{"title":"Implementing Information Lifecycle Security (ILS)","authors":"Bill Reed","doi":"10.1080/10658980601144907","DOIUrl":"https://doi.org/10.1080/10658980601144907","url":null,"abstract":"* This article originally published in EDPACS 35(2), February 2007, pp 18–24.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73039137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Handheld Devices Become Trusted Network Devices 无线手持设备成为受信任的网络设备
Journal of Information Systems Security Pub Date : 2007-05-01 DOI: 10.1080/10658980701401686
K. Curran, P. Canning
{"title":"Wireless Handheld Devices Become Trusted Network Devices","authors":"K. Curran, P. Canning","doi":"10.1080/10658980701401686","DOIUrl":"https://doi.org/10.1080/10658980701401686","url":null,"abstract":"ABSTRACT In the world of information technology, a security model is only as secure as its weakest link. There are several layers of security and different measures that can currently be implemented. However, they lack coordination, and therefore potential security breaches might compromise the network. With wireless access becoming the norm, and users requiring “on the move communication” even within a campus, networks are expanding past the traditional wired networks by adding wireless access points. This gives customers the flexibility they require but leaves a net threat vector to the network. There have been various encryption and security steps taken to validate the communication and authentication of the devices and end users connecting. This project addresses the critical problem of secure authentication using the 802.1x standard, which will be implemented using Microsoft's Radius server elements. It will involve the enrollment of secure certificates on Windows mobile devices, thus securing mobile devices from physical attacks. To ensure that all steps are adhered to, that all necessary applications have been installed, and to handle Web service communication, an application will be created that will provide an automated solution.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83691577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management 基于身份的加密:从身份和访问管理到企业隐私管理
Journal of Information Systems Security Pub Date : 2007-03-28 DOI: 10.1080/10658980601051268
Luther Martin
{"title":"Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management","authors":"Luther Martin","doi":"10.1080/10658980601051268","DOIUrl":"https://doi.org/10.1080/10658980601051268","url":null,"abstract":"ates is difficult to understand. It is a bewildering array of legislation that requires the protection of many types of data, or limits access to this data to only authorized personnel. Managing the identities and roles of personnel who can access sensitive data can be accomplished using existing Identity and Access Management (IAM) technologies and Identity-based Encryption (IBE). IBE, a new encryption technology that uses such identity information as an encryption key, promises to provide a way to use an IAM infrastructure to address the challenges of maintaining the privacy of sensitive corporate data.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10658980601051268","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72463719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
From the Editor's Desk 从编辑部
Journal of Information Systems Security Pub Date : 2007-03-28 DOI: 10.1080/10658980701331594
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701331594","DOIUrl":"https://doi.org/10.1080/10658980701331594","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82357792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Good and Not So Good of Enforcing Password Composition Rules 执行密码组合规则的好与不好
Journal of Information Systems Security Pub Date : 2007-03-28 DOI: 10.1080/10658980601051375
John Campbell, Dale Kleeman, Wanli Ma
{"title":"The Good and Not So Good of Enforcing Password Composition Rules","authors":"John Campbell, Dale Kleeman, Wanli Ma","doi":"10.1080/10658980601051375","DOIUrl":"https://doi.org/10.1080/10658980601051375","url":null,"abstract":"ABSTRACT Many systems rely on password composition rules to force users to choose more secure passwords. The findings discussed here are from a study on the enforcement of good password practice in the form of password composition rules. The results show that the enforcement of password composition rules does not discourage users from using meaningful information in passwords. While composition rules reduce password reuse, the overall incidence remains high. Passwords created under these conditions are also perceived to be more difficult to remember. Nevertheless, the enforcement of password composition rules does significantly improve protection against dictionary-based attack.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84661703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
The Future of Cryptography 密码学的未来
Journal of Information Systems Security Pub Date : 2007-03-28 DOI: 10.1080/10658980601051284
J. Callas
{"title":"The Future of Cryptography","authors":"J. Callas","doi":"10.1080/10658980601051284","DOIUrl":"https://doi.org/10.1080/10658980601051284","url":null,"abstract":"We’ve seen where cryptography came from, but where is it going? In this article, I pose a number of unsolved problems: challenges that face us with which we have to deal. Some of them are elephants in the room that we’re all ignoring, or if not ignoring we’re noting that they’re in the room, take up a lot of space, and do make it hard to dust, but then we go back to the previous subject. Others are genuinely hard problems without a good solution. Still others are tradeoffs. Consider this a tour of stopoffs at interesting problems and surprising things.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76487452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Designing Networks that Enforce Information Security Policies 设计实施信息安全策略的网络
Journal of Information Systems Security Pub Date : 2007-03-28 DOI: 10.1080/10658980601051490
Al Malin
{"title":"Designing Networks that Enforce Information Security Policies","authors":"Al Malin","doi":"10.1080/10658980601051490","DOIUrl":"https://doi.org/10.1080/10658980601051490","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86617182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pump and Dump Scams 泵和转储骗局
Journal of Information Systems Security Pub Date : 2007-03-28 DOI: 10.1080/10658980601051755
Ken Dunham
{"title":"Pump and Dump Scams","authors":"Ken Dunham","doi":"10.1080/10658980601051755","DOIUrl":"https://doi.org/10.1080/10658980601051755","url":null,"abstract":"A MASSIVE MARKETING CAMPAIGN HAS BEGUN FOR THE FIRST WEEK OF 2006. AND WE FEEL IT'S GOING TO HIT OVER 200% GAIN THIS WEEK WITH NEW INVESTORS AND BIG NEWS. THIS IS A HUGE PLAYER STARTING MONDAY, JAN. 2ND, AND WE 100% SAY PUT THIS ONE ON YOUR RADAR.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78776052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Through Deception 通过欺骗获得安全
Journal of Information Systems Security Pub Date : 2007-03-28 DOI: 10.1080/10658980601051458
S. Vidalis, Z. Kazmi
{"title":"Security Through Deception","authors":"S. Vidalis, Z. Kazmi","doi":"10.1080/10658980601051458","DOIUrl":"https://doi.org/10.1080/10658980601051458","url":null,"abstract":"ABSTRACT For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you cannot have the former without the latter. In today's technological & interconnected world, however, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76244349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信